Skip to content

Commit 23ee2ab

Browse files
Merge pull request #19444 from MicrosoftDocs/main
Auto Publish – main to live - 2026-01-23 18:30 UTC
2 parents 4791c83 + a291e4e commit 23ee2ab

11 files changed

Lines changed: 107 additions & 236 deletions

.openpublishing.redirection.intune.json

Lines changed: 22 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -657,7 +657,7 @@
657657
},
658658
{
659659
"source_path": "intune/intune/apps/mamedge-5-end-user-experience.md",
660-
"redirect_url": "/intune/intune-service/apps/mamedge-7-end-user-experience",
660+
"redirect_url": "/intune/intune-service/apps/mamedge-6-end-user-experience",
661661
"redirect_document_id": false
662662
},
663663
{
@@ -667,32 +667,47 @@
667667
},
668668
{
669669
"source_path": "intune/intune/apps/mamedge-6-security-baseline.md",
670-
"redirect_url": "/intune/intune-service/apps/mamedge-6-security-baseline",
670+
"redirect_url": "/intune/intune-service/apps/mamedge-overview",
671671
"redirect_document_id": false
672672
},
673673
{
674674
"source_path": "intune/intune/apps/mamedge-6-troubleshoot.md",
675-
"redirect_url": "/intune/intune-service/apps/mamedge-8-troubleshoot",
675+
"redirect_url": "/intune/intune-service/apps/mamedge-7-troubleshoot",
676676
"redirect_document_id": false
677677
},
678678
{
679679
"source_path": "intune/intune-service/apps/mamedge-5-end-user-experience.md",
680-
"redirect_url": "/intune/intune-service/apps/mamedge-7-end-user-experience",
680+
"redirect_url": "/intune/intune-service/apps/mamedge-6-end-user-experience",
681681
"redirect_document_id": false
682682
},
683683
{
684684
"source_path": "intune/intune-service/apps/mamedge-6-troubleshoot.md",
685-
"redirect_url": "/intune/intune-service/apps/mamedge-8-troubleshoot",
685+
"redirect_url": "/intune/intune-service/apps/mamedge-7-troubleshoot",
686686
"redirect_document_id": false
687687
},
688688
{
689689
"source_path": "intune/intune/apps/mamedge-7-end-user-experience.md",
690-
"redirect_url": "/intune/intune-service/apps/mamedge-7-end-user-experience",
690+
"redirect_url": "/intune/intune-service/apps/mamedge-6-end-user-experience",
691691
"redirect_document_id": false
692692
},
693693
{
694694
"source_path": "intune/intune/apps/mamedge-8-troubleshoot.md",
695-
"redirect_url": "/intune/intune-service/apps/mamedge-8-troubleshoot",
695+
"redirect_url": "/intune/intune-service/apps/mamedge-7-troubleshoot",
696+
"redirect_document_id": false
697+
},
698+
{
699+
"source_path": "intune/intune-service/apps/mamedge-6-security-baseline.md",
700+
"redirect_url": "/intune/intune-service/apps/mamedge-overview",
701+
"redirect_document_id": false
702+
},
703+
{
704+
"source_path": "intune/intune-service/apps/mamedge-7-end-user-experience.md",
705+
"redirect_url": "/intune/intune-service/apps/mamedge-6-end-user-experience",
706+
"redirect_document_id": false
707+
},
708+
{
709+
"source_path": "intune/intune-service/apps/mamedge-8-troubleshoot.md",
710+
"redirect_url": "/intune/intune-service/apps/mamedge-7-troubleshoot",
696711
"redirect_document_id": false
697712
},
698713
{

intune/intune-service/apps/mamedge-1-mamca.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Step 1. Create Microsoft Entra Conditional Access with Microsoft Edge for Business
33
description: Step 1. Create Microsoft Entra Conditional Access with Microsoft Edge for Business.
4-
ms.date: 12/05/2025
4+
ms.date: 01/23/2026
55
ms.topic: how-to
66
ms.reviewer: samarti
77
ms.custom:
@@ -168,6 +168,4 @@ Use this companion policy to ensure that desktop applications on Windows devices
168168

169169
## Next step
170170

171-
[:::image type="content" source="./media/securing-data-edge-for-business/securing-data-edge-for-business-steps-02.png" alt-text="Step 2 to create an app protection policy.":::](mamedge-2-app.md)
172-
173171
Continue with [Step 2](mamedge-2-app.md) to create an app protection policy.

intune/intune-service/apps/mamedge-2-app.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Step 2. Create App Protection Policies for Microsoft Edge for Business
33
description: Step 2. Create app protection policies for Microsoft Edge for Business across Windows, Android, and iOS platforms.
4-
ms.date: 12/05/2025
4+
ms.date: 01/23/2026
55
ms.topic: how-to
66
ms.reviewer: samarti
77
ms.custom:
@@ -614,6 +614,4 @@ Level 3 configuration provides the highest level of data protection and is recom
614614

615615
## Next step
616616

617-
[:::image type="content" source="./media/securing-data-edge-for-business/securing-data-edge-for-business-steps-03.png" alt-text="Step 3 to integrate Mobile Threat Defense with Microsoft Edge for Business.":::](mamedge-3-scc.md)
618-
619617
Continue with [Step 3](mamedge-3-scc.md) to integrate Mobile Threat Defense with Microsoft Edge for Business.

intune/intune-service/apps/mamedge-3-scc.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Step 3. Integrate Mobile Threat Defense for App Protection Policy
33
description: Step 3. Integrate Mobile Threat Defense signals with Microsoft Edge for Business app protection policies in Microsoft Intune.
4-
ms.date: 12/05/2025
4+
ms.date: 01/23/2026
55
ms.topic: how-to
66
ms.reviewer: samarti
77
ms.custom:
@@ -118,6 +118,4 @@ Use the following steps to configure the MTD Connector.
118118
119119
## Next step
120120

121-
[:::image type="content" source="./media/securing-data-edge-for-business/securing-data-edge-for-business-steps-04.png" alt-text="Step 2 to create an app protection policy.":::](mamedge-4-acp-edge.md)
122-
123121
Continue with [Step 4](mamedge-4-acp-edge.md) to create app configuration policies for Microsoft Edge for Business.

intune/intune-service/apps/mamedge-4-acp-edge.md

Lines changed: 25 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Step 4. Create App Configuration Policies for Microsoft Edge for Business
33
description: Step 4. Create app configuration policies for Microsoft Edge for Business across Windows, Android, and iOS platforms.
4-
ms.date: 12/05/2025
4+
ms.date: 01/23/2026
55
ms.topic: how-to
66
ms.reviewer: samarti
77
ms.custom:
@@ -21,6 +21,29 @@ This step defines three progressive ACP configurations per platform, Level 1 (Ba
2121
> [!NOTE]
2222
> App configuration policies customize browser features and behavior. They complement app protection policies that focus on data protection.
2323
24+
## Policy Selection Based on Device Enrollment
25+
26+
App Configuration Policies (this step) are designed for non-enrolled devices using the Managed Apps configuration channel, while Settings Catalog policies (Step 5) are designed for enrolled devices with device-level controls.
27+
28+
> [!IMPORTANT]
29+
> Choose the appropriate policy type based on device enrollment status to avoid policy conflicts.
30+
31+
## Security Level Selection
32+
33+
The three security levels (Level 1, 2, 3) are not cumulative - they represent progressively stricter configurations designed for different user roles and data sensitivity requirements.
34+
35+
### Implementation Guidance
36+
37+
- Evaluate your scenarios and user roles to determine which level is appropriate for each user group
38+
- Deploy only one level per user/device, not all three levels simultaneously
39+
- Align security level assignment with business role and data access requirements
40+
41+
### Example Assignments
42+
43+
- **Level 1 (Basic)**: General users, standard productivity workflows (~80% of users)
44+
- **Level 2 (Enhanced)**: Finance, HR, IT staff handling sensitive data (~15% of users)
45+
- **Level 3 (High)**: Executives, SecOps, Legal, users with access to highly confidential data (~5% of users)
46+
2447
::: zone pivot="windows"
2548

2649
## App configuration policies for Windows
@@ -802,8 +825,6 @@ Level 3 configuration enforces maximum security with zero-trust controls and com
802825

803826
::: zone-end
804827

805-
## Next steps
806-
807-
[:::image type="content" source="./media/securing-data-edge-for-business/securing-data-edge-for-business-steps-05.png" alt-text="Step 2 to create an app protection policy.":::](mamedge-5-settings-catalog.md)
828+
## Next step
808829

809830
Continue to [Step 5](mamedge-5-settings-catalog.md) to configure Settings Catalog policies for enrolled Windows and macOS devices.

intune/intune-service/apps/mamedge-5-settings-catalog.md

Lines changed: 28 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Step 5. Create Settings Catalog policies for Microsoft Edge for Business
33
description: Step 5. Create Settings Catalog policies for Microsoft Edge for Business on Windows and macOS.
4-
ms.date: 12/05/2025
4+
ms.date: 01/23/2026
55
ms.topic: how-to
66
ms.reviewer: samarti
77
ms.custom:
@@ -19,6 +19,31 @@ Settings Catalog policies provide deep device-level control for Microsoft Edge b
1919
> [!NOTE]
2020
> Settings Catalog requires device enrollment and provides device-level controls. For unmanaged devices, use App Protection Policies (Step 2) and App Configuration Policies (Step 4).
2121
22+
## Policy Selection for Enrolled Devices
23+
24+
App Configuration Policies (Step 4) are designed for non-enrolled devices and use the Managed Apps configuration channel, while Settings Catalog policies (this step) are designed for enrolled devices and provide device-level controls.
25+
26+
> [!IMPORTANT]
27+
> Never deploy both App Configuration Policies and Settings Catalog policies targeting Microsoft Edge to the same client, as this creates policy conflicts.
28+
29+
For enrolled Windows devices, you can choose to use either Settings Catalog policies (recommended for flexibility) or the Microsoft Edge Security Baseline from **Endpoint Security** > **Security baselines**, but not both simultaneously as this creates conflicts.
30+
31+
## Security Level Selection
32+
33+
The three security levels (Level 1, 2, 3) are not cumulative - they represent progressively stricter configurations designed for different user roles and data sensitivity requirements.
34+
35+
### Implementation Guidance
36+
37+
- Evaluate your scenarios and user roles to determine which level is appropriate for each user group
38+
- Deploy only one level per user/device, not all three levels simultaneously
39+
- Align security level assignment with business role and data access requirements
40+
41+
### Example Assignments
42+
43+
- **Level 1 (Basic)**: General users, standard productivity workflows (~80% of users)
44+
- **Level 2 (Enhanced)**: Finance, HR, IT staff handling sensitive data (~15% of users)
45+
- **Level 3 (High)**: Executives, SecOps, Legal, users with access to highly confidential data (~5% of users)
46+
2247
::: zone pivot="windows"
2348

2449
## Settings Catalog for Windows
@@ -468,8 +493,6 @@ After deploying Settings Catalog policies:
468493

469494
::: zone-end
470495

471-
## Next steps
472-
473-
[:::image type="content" source="./media/securing-data-edge-for-business/securing-data-edge-for-business-steps-06.png" alt-text="Step 2 to create an app protection policy.":::](mamedge-6-security-baseline.md)
496+
## Next step
474497

475-
Continue to [Step 6](mamedge-6-security-baseline.md) to deploy the Microsoft Edge security baseline.
498+
Continue to [Step 6](mamedge-6-end-user-experience.md) to understand the Microsoft Edge for Business end user experience.

intune/intune-service/apps/mamedge-7-end-user-experience.md renamed to intune/intune-service/apps/mamedge-6-end-user-experience.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: Step 7. Understand Microsoft Edge for Business End User Experience for Windows
3-
description: Step 7. Understand Microsoft Edge for Business end user experience Windows.
4-
ms.date: 12/05/2025
2+
title: Step 6. Understand Microsoft Edge for Business End User Experience for Windows
3+
description: Step 6. Understand Microsoft Edge for Business end user experience Windows.
4+
ms.date: 01/23/2026
55
ms.topic: how-to
66
ms.reviewer: samarti
77
ms.custom:
@@ -11,9 +11,9 @@ ms.collection:
1111
- FocusArea_Apps_AppManagement
1212
---
1313

14-
# Step 7. Understand Microsoft Edge for Business End User Experience for Windows
14+
# Step 6. Understand Microsoft Edge for Business End User Experience for Windows
1515

16-
Now that you configured your Microsoft Entra Conditional Access policy, app protection policies, app configuration policies, settings catalog, and security baseline, you can launch **Microsoft Edge for Business** using a managed or unmanaged device.
16+
Now that you configured your Microsoft Entra Conditional Access policy, app protection policies, app configuration policies, and settings catalog, you can launch **Microsoft Edge for Business** using a managed or unmanaged device.
1717

1818
The end user experience in Microsoft Edge for Business is designed to be productive, secure, and user-friendly. This secure enterprise browser experience includes the following features:
1919

@@ -89,6 +89,4 @@ Intune displays notifications when a policy requirement isn’t met. The followi
8989

9090
## Next step
9191

92-
[:::image type="content" source="./media/securing-data-edge-for-business/securing-data-edge-for-business-steps-08.png" alt-text="Step 2 to create an app protection policy.":::](mamedge-8-troubleshoot.md)
93-
94-
Continue with [Step 8](mamedge-8-troubleshoot.md) to troubleshoot Microsoft Edge for Business.
92+
Continue with [Step 7](mamedge-7-troubleshoot.md) to troubleshoot Microsoft Edge for Business.

0 commit comments

Comments
 (0)